Static task
static1
Behavioral task
behavioral1
Sample
40574f18d29120e39ef24902a69f3cd5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
40574f18d29120e39ef24902a69f3cd5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
40574f18d29120e39ef24902a69f3cd5_JaffaCakes118
-
Size
32KB
-
MD5
40574f18d29120e39ef24902a69f3cd5
-
SHA1
1e4b769e3c13885251b2c314d4f2f6d2cb24be45
-
SHA256
5e39cdfdceb5c90cfccdcec112c34a62092f8e6d39b38ae9037ecec7b2781f4a
-
SHA512
34f2e160c18f3d6530f53900b134c730a88f43452fc55464c5ac7866da9b5392e40e078b238d2155d88ea84546bd56490fafbf3d46bbd51c4d11d828ffb16d4d
-
SSDEEP
384:XgzCwZFjX4RLp95CxXl3u6AqaaG+oJrWWO2fMfagmLQ7IEwVT5OZlB1lap0UA3yy:ECwQREAq2aBzULGwV6lB1QploN+/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40574f18d29120e39ef24902a69f3cd5_JaffaCakes118
Files
-
40574f18d29120e39ef24902a69f3cd5_JaffaCakes118.exe windows:4 windows x86 arch:x86
9c810df634395e92ec110e67464f02ed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
sprintf
strcmp
strncmp
memcpy
fseek
ftell
fread
fabs
ceil
malloc
floor
free
fclose
strlen
memmove
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
HeapFree
HeapAlloc
SetLastError
InitializeCriticalSection
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceFrequency
LoadLibraryA
GetProcAddress
FreeLibrary
TlsAlloc
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
TlsGetValue
TlsSetValue
HeapReAlloc
DeleteCriticalSection
WaitForMultipleObjects
CloseHandle
GetCurrentProcess
GetCurrentThread
DuplicateHandle
CreateSemaphoreA
CreateThread
ReleaseSemaphore
d3d9
Direct3DCreate9
d3dx9_31
D3DXMatrixPerspectiveFovLH
D3DXMatrixTranslation
D3DXMatrixRotationYawPitchRoll
D3DXMatrixMultiply
comctl32
InitCommonControls
InitCommonControlsEx
user32
SetWindowPos
GetWindow
SetActiveWindow
RemovePropA
SendMessageA
DestroyWindow
UnregisterClassA
DestroyAcceleratorTable
LoadIconA
LoadCursorA
RegisterClassA
AdjustWindowRectEx
GetSystemMetrics
GetActiveWindow
GetWindowRect
CreateWindowExA
SetPropA
ShowWindow
CreateAcceleratorTableA
SetCursorPos
LoadImageA
SetCursor
GetWindowLongA
GetParent
MapWindowPoints
MoveWindow
SystemParametersInfoA
GetKeyState
SetCapture
PostMessageA
GetCursorPos
ReleaseCapture
PeekMessageA
MsgWaitForMultipleObjects
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
GetPropA
SetFocus
GetFocus
GetClientRect
FillRect
EnumChildWindows
DefFrameProcA
DefWindowProcA
IsWindowEnabled
IsWindowVisible
IsChild
GetClassNameA
CallWindowProcA
SetWindowLongA
MessageBoxA
GetWindowThreadProcessId
GetForegroundWindow
EnableWindow
EnumWindows
ShowCursor
InvalidateRect
BeginPaint
EndPaint
RegisterClassExA
DestroyIcon
gdi32
DeleteObject
GetStockObject
GetObjectType
GetObjectA
CreateCompatibleDC
GetDIBits
DeleteDC
CreateDIBSection
SelectObject
BitBlt
CreateBitmap
SetPixel
ole32
RevokeDragDrop
CoInitialize
winmm
timeGetTime
timeEndPeriod
Sections
.code Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 262KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE